Securing Remote Access in Palo Alto Networks

Book Cover
Average Rating
Published
Packt Publishing, 2021.
Status
Available Online

Description

Loading Description...

More Details

Format
Edition
1st edition.
Language
English
ISBN
9781801076111, 1801076111
UPC
9781801077446

Notes

Description
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.
Issuing Body
Made available through: Safari, an O'Reilly Media Company.
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Discover More

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Piens, T. (2021). Securing Remote Access in Palo Alto Networks (1st edition.). Packt Publishing.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Piens, Tom. 2021. Securing Remote Access in Palo Alto Networks. Packt Publishing.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Piens, Tom. Securing Remote Access in Palo Alto Networks Packt Publishing, 2021.

Harvard Citation (style guide)

Piens, T. (2021). Securing remote access in palo alto networks. 1st edn. Packt Publishing.

MLA Citation, 9th Edition (style guide)

Piens, Tom. Securing Remote Access in Palo Alto Networks 1st edition., Packt Publishing, 2021.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
28d40d14-178f-0cf0-885d-8b84a552cbd5-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID28d40d14-178f-0cf0-885d-8b84a552cbd5-eng
Full titlesecuring remote access in palo alto networks
Authorpiens tom
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-01-30 03:05:51AM

Book Cover Information

Image Sourcedefault
First LoadedJan 1, 2025
Last UsedJan 28, 2025

Marc Record

First DetectedDec 16, 2024 11:17:07 PM
Last File Modification TimeDec 17, 2024 08:16:54 AM
SuppressedRecord had no items

MARC Record

LEADER04152cam a22004817a 4500
001on1260236991
003OCoLC
00520241217081452.0
006m     o  d        
007cr cnu||||||||
008210715s2021    xx      o     000 0 eng d
020 |a 9781801076111|q (electronic bk.)
020 |a 1801076111|q (electronic bk.)
0248 |a 9781801077446
035 |a (OCoLC)1260236991
037 |a 10162535|b IEEE
040 |a AU@|b eng|c AU@|d OCLCQ|d TOH|d OCLCQ|d IEEEE|d OCLCF|d OCLCO|d OCLCL
049 |a MAIN
050 4|a QA76.9.A25
08204|a 004.6|q OCoLC|2 23/eng/20230216
1001 |a Piens, Tom,|e author.
24510|a Securing Remote Access in Palo Alto Networks /|c Piens, Tom.
250 |a 1st edition.
264 1|b Packt Publishing,|c 2021.
300 |a 1 online resource (336 pages)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
347 |a text file
5050 |a Table of Contents Centralizing logs Configuring Advanced GlobalProtect Features Setting up site-to-site VPNs and Large Scale VPNs Configuring Prisma Access Enabling features to improve your security posture Anti Phishing with User Credential Detection Practical troubleshooting and Best Practice Tools.
520 |a Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book Description This book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is for This book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.
542 |f Copyright © 2021 Packt Publishing|g 2021
550 |a Made available through: Safari, an O'Reilly Media Company.
588 |a Online resource; Title from title page (viewed July 2, 2021)
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer networks|x Remote access.|9 26881
650 0|a Firewalls (Computer security)|9 26947
7102 |a Safari, an O'Reilly Media Company.
758 |i has work:|a Securing Remote Access in Palo Alto Networks (Text)|1 https://id.oclc.org/worldcat/entity/E39PCXQwRRhxy48QpVFc3BQW9P|4 https://id.oclc.org/worldcat/ontology/hasWork
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781801077446/?ar|x O'Reilly|z eBook
936 |a BATCHLOAD
994 |a 92|b VIA
999 |c 357724|d 357724